~ Contributed by Warren F. Kuhfeld, Sr Manager, R&D, SAS ~ I love the classic Beatles song, A Day in the Life, and the line: “Woke up, fell out of bed, dragged a comb across my head.” I am a member of the SAS/STAT development team, and this i…
Category: SAS
Using Windows PowerShell to download a file from a SAS Workspace session
In a previous article, I described how to use Windows PowerShell to connect to a remote SAS Workspace, run a SAS program, and retrieve the results. In that example, the only results I retrieved were the SAS log and SAS listing (text) output, if any. When you run a SAS […]
First-ever SAS training for warranty managers
SAS and the Global Warranty and Service Contract Association (GWSCA) recently teamed up to create the first-of-its-kind training for professionals in the warranty management field. In this Q&A, GWSCA president and course instructor G. Terry Hawkins…
NOTE: SAS Talks Revisited
It’s been quite a while since I last mentioned the excellent SAS Talks series. In the intervening period, the archive of talks has grown enormously. The archive of talks is a veritable treasure trove of SAS knowledge.
SAS Talks is principally a s…
Promoting SAS Security Metadata (in Custom Repositories)
Did you know that with SAS® 9.3 you can promote (export/import) SAS metadata packages containing users, groups, roles, and ACTs, just like you can with Jobs, Tables, Libraries, Stored Processes, Reports and Information Maps? I needed to do this myself…
List Processing With SAS: A Github Repository
I have a function like macro (recursive version) to create a sequence: %macro _list(n,pre=ff); %if &n=1 %then &pre.1; %else %_list(%eval(&n-1)),&pre.&n; %mend _list; %put %_list(3); *produces ff1, ff2, ff3; But when I read one of Ian Whitlock’s papers, Names, Names, Names – Make Me a List (SGF 2007, SESUG 2008), I say: stop! I’m […]
Announcing the Metacoda MetaMetaMetaDataAnalyzer
At Metacoda, we understand the importance of metadata for today’s modern fast-paced organizations. We know that software to help organizations manage and exploit their valuable metadata resources is increasingly valued as the volumes and breadths…
Protecting your Metadata Protections: Part 2
In a guest post on blogs.sas.com in January, I wrote about protecting your metadata protections. In that post I said that “Ideally, a SAS® metadata security plan should address both ACT permissions and access to the Authorization Manager.”…